Skip to content

Latest commit

 

History

History
206 lines (100 loc) · 7.74 KB

README.md

File metadata and controls

206 lines (100 loc) · 7.74 KB

gablogo

Step goals

Azure Security Center monitors the security of machines, networks, storage and data services. At present it is doing a continuous assessment of the artifacts that we have added previously. It will aid in in discovering actionable recommendations for our Virtual Machine which we have procured. Virtual Machines in the cloud can be used to develop, host, run custom software. They however need to be secured and oversight via Azure Security Center is just the thing!

In order to secure the Virtual Machine, we will use Azure Security to oversee a few security related elements:

  • Manage endpoint protection issues with Azure Security Center
  • Secure the Virtual Machine with Network Storage Groups (NSG)
  • Enable JIT for remote desktop

Let's configure!

Lab 1 - Manage endpoint protection issues with Azure Security Center

Step 1 - Oversee the recommendation

Azure Security Center monitors the status of antimalware protection and reports this under the Endpoint protection issues blade. Security Center highlights issues, such as detected threats and insufficient protection, which can make your virtual machines (VMs) and computers vulnerable to antimalware threats.

Security Center reports the following endpoint protection issues:

  • Endpoint protection not installed on Azure VMs – A supported antimalware solution is not installed on these Azure VMs.

alt text

Step 2 - Implement the recommendation

Endpoint protection issues is presented as a recommendation in Security Center. this recommendation will be displayed under Prevention and under Compute.

Under Compute, select Endpoint protection issues. The Endpoint protection issues dashboard opens.

alt text

Click on Endpoint Protection not installed on Azure VMs.

alt text

Check the box for the VM and click on the Install on 1 VMs icon.

alt text

Click on the Microsoft Antimalware blade.

alt text

Click on Create

alt text

Accept Defaults and click Ok or you can select the scan option as well.

alt text

Installation will begin

alt text

When complete, return to the Azure Security Center under Compute and the Recommendation is no longer present.

alt text

This lab showed you how to implement the Security Center recommendation "Install Endpoint Protection." To learn more about enabling Microsoft Antimalware in Azure, see the following links:

Lab 2 - Enable Network Security Groups in Azure Security Center

Azure Security Center recommends that you enable a network security group (NSG) if one is not already enabled. NSGs contain a list of Access Control List (ACL) rules that allow or deny network traffic to your VM instances in a Virtual Network. NSGs can be associated with either subnets or individual VM instances within that subnet. When an NSG is associated with a subnet, the ACL rules apply to all the VM instances in that subnet. In addition, traffic to an individual VM can be restricted further by associating an NSG directly to that VM.

Step 1 - Oversee the recommendation

Open the Security Center dashboard.

Select Networking. from the recommendations pane.

alt text

Oversee the Networking related recommendations and notive that there is a recommendation for NSGs on both the subnet and the VM. We will be adding the NSGs to the subnet.

Click on NSGs on subnets not enabled

alt text

This will open the Configure Missing Network Security groups for Subnets Pane.

Select Lan Lan Virtual Network.

alt text

select gab2018-dev-nsg-lan-YOURKEY as the NSG to utilize

alt text

Lastly the notification will shows itself and display Creating NSG Resource.

alt text

Once complete we can go back to the recommendations pane and after some time the issue will be shown as resolved.

Lab 3 -Enable JIT (Just in Time) for remote desktop

Just in time virtual machine (VM) access can be used to lock down inbound traffic to your Azure VMs, reducing exposure to attacks while providing easy access to connect to VMs when needed.

Step 1 - Manage virtual machine access using just in time

Open the Security Center dashboard.

In the left pane, select Just in time VM access.

alt text

The Just in time VM access blade will open.

alt text

Click the Try Just in time VM Access.

alt text

This step may have already previously been completed if you have the Standard plan already. However ,if you do not we will Apply Standard plan which is free for 60 days. Select the appropriate Name of the Subscription where your VM is located.

Azure will commence the procurement. The progress can be monitored in the Notifications area Top-Right in Azure Portal.

alt text

Once complete.

To select the VMs that you want to enable:

  1. Under Just in time VM access , select the Recommended tab.

alt text

  1. Under VIRTUAL MACHINE, select the VMs that you want to enable. This puts a checkmark next to a VM.
  2. Select Enable JIT on VMs.
  3. Select Save.

You can see the default ports that Security Center recommends you configure.

  1. Under Just in time VM access, select the Recommended tab.

alt text

  1. Under VMs, select a VM. This puts a checkmark next to the VM and opens JIT VM access configuration. This blade displays the default ports.

Step 2 - Requesting access to a VM

To request access to a VM:

  1. Under Just in time VM access, select the Configured tab.
  2. Under VMs, select the VMs that you want to enable access. This puts a checkmark next to a VM.

alt text

  1. Select Request access. This opens Request access.

alt text

  1. Under Request access, you configure for each VM the ports to open along with the source IP that the port is opened to and the time window for which the port is opened. You can request access only to the ports that are configured in the just in time policy. Each port has a maximum allowed time derived from the just in time policy.

  2. Select Open ports.

  3. A notification stating that the JIT network access request initiated is being run will appear.

alt text

  1. Return to the JIT blade and select the Configured tab. Note the values in the Approved/LastAccess/LastUserBlade.

alt text

  1. You can now navigate to your VM and click on Connect. This will download an .rdp file.

alt text

  1. Connectivity can now be tested. Do note that the NSG rules will be augmented and perusing them will showcase this.

alt text

  1. Lastly to oversee the changes that Just in time has done. You can navigate to your vm and click on the Netwoking blade then the Inbound Rules. Notice the additions.

alt text

End

Previous Step Next Step